Tue.Nov 13, 2018

article thumbnail

Magecart Cybercrime Groups Mass Harvest Payment Card Data

Data Breach Today

Card-Scraping Code Has Infiltrated Over 100,000 E-Commerce Sites Over the past year, there's been a surge in so-called Magecart attacks, involving payment card data being stolen from e-commerce sites via injected attack code. Researchers say they are tracing at least six active Magecart groups, each with unique infrastructure, skimmers and targeting.

252
252
article thumbnail

That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards

Krebs on Security

If you own a domain name that gets decent traffic and you fail to pay its annual renewal fee, chances are this mistake will be costly for you and for others. Lately, neglected domains have been getting scooped up by crooks who use them to set up fake e-commerce sites that steal credit card details from unwary shoppers. For nearly 10 years, Portland, Ore. resident Julie Randall posted pictures for her photography business at julierandallphotos-dot-com , and used an email address at that domain to

Sales 213
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

French Cinema Chain Fires Dutch Executives Over 'CEO Fraud'

Data Breach Today

$21 Million Lost to Business Email Compromise Fraudsters French film production and distribution company Pathe fired the two senior managers overseeing its Dutch operations after they fell victim to a business email compromise scam and approved $21 million in transfers to fraudsters. Many organizations remain at high risk from such scams.

Risk 213
article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

Cyber criminals are deploying the very latest in automated weaponry, namely botnets, to financially plunder corporate networks. The attackers have a vast, pliable attack surface to bombard: essentially all of the externally-facing web apps, mobile apps and API services that organizations are increasingly embracing, in order to stay in step with digital transformation.

Security 104
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Who Hijacked Google's Web Traffic?

Data Breach Today

Data Routes Through Russia, Nigeria and China, Raising Security Concerns Google is investigating the unorthodox routing of traffic bound for its cloud services that instead traveled via internet service provides in Nigeria, Russia and China. Security experts say border gateway protocol is to blame, but that no easy fix is in sight.

Cloud 187

More Trending

article thumbnail

Magecart Cybercrime Groups Harvest Payment Card Data

Data Breach Today

Card-Scraping Code Has Infiltrated Over 100,000 E-Commerce Sites Over the past year, there's been a surge in so-called Magecart attacks, which involve payment card data being stolen from e-commerce sites via injected attack code. Researchers say they are tracing at least six active Magecart groups, each with unique infrastructure, skimmers and targeting.

190
190
article thumbnail

EU DPAs Receive Thousands of Complaints Under the GDPR

Data Matters

European Digital Rights (EDRi), a digital user rights non-for-profit organisation, on 25 October 2018, launched an online platform, ‘ GDPR Today ’. In its first edition of the GDPR Today , the EDRi published statistics collected from eight EU Member States (France, Germany, Ireland, Italy, Poland, Romania, Sweden and the United Kingdom). The statistics show that since the GDPR’s entry into force on 25 May 2018, data protection authorities (DPAs) have received thousands of complaints from EU indi

GDPR 89
article thumbnail

Breach of Obamacare Site Spilled Sensitive Data

Data Breach Today

75,000 Victims' Income, Pregnancy Status and More Potentially Exposed More than two weeks after announcing that the Obamacare website, HealthCare.gov, had been hacked, the Department of Health and Human Services has revealed that the breach exposed a wealth of information, including partial Social Security numbers and immigration status.

Security 187
article thumbnail

Moody’s to Include Cyber Risk in Credit Ratings

Adam Levin

The American business and financial services company Moody’s will start factoring risk of getting hacked into their credit ratings for companies. The move is seen as part of a wider initiative to gauge the risk of cyberattacks and data breaches to companies and their investors. “We’ve been in the risk management business for a very long time. This is to enhance our thinking about credit as cyber becomes more and more important,” said Derek Valda, head of Moody’s Investors Services Cyber Ri

Risk 81
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

IoT Security: Essential Steps for Security by Design

Data Breach Today

Manufacturers need to change their approach to securing internet of things devices, says Aloysius Cheang, executive vice president for Asia Pacific at the Center for Strategic Cyberspace + Security Science, a U.K.-based think tank, who describes what needs to be done.

IoT 133
article thumbnail

Microsoft’s Patch Tuesday updates for November 2018 fix actively exploited Windows flaw

Security Affairs

Microsoft’s Patch Tuesday updates for November 2018 fixed more than 60 vulnerabilities, including an actively exploited Windows flaw. Microsoft’s Patch Tuesday updates for November 2018 addressed 63 vulnerabilities, including an actively exploited Windows privilege escalation vulnerability. Twelve of the flaws were rated as “Critical”, 49 are rated Important, two vulnerabilities were publicly known at the time of release (CVE-2018-8584, a Windows ALPC elevation of privilege issue, an

article thumbnail

Breach of Obamacare Healthcare Site Spilled Sensitive Data

Data Breach Today

75,000 Victims' Income, Pregnancy Status and More Potentially Exposed More than two weeks after announcing that the Obamacare website, HealthCare.gov, had been hacked, the Department of Health and Human Services has revealed that the breach exposed a wealth of information, including partial Social Security numbers and immigration status.

Security 113
article thumbnail

Privacy Advocacy Organization Files GDPR Complaints Against Data Brokers

Hunton Privacy

On November 8, 2018, Privacy International (“Privacy”), a non-profit organization “dedicated to defending the right to privacy around the world,” filed complaints under the GDPR against consumer marketing data brokers Acxiom and Oracle. In the complaint, Privacy specifically requests the Information Commissioner (1) conduct a “full investigation into the activities of Acxiom and Oracle,” including into whether the companies comply with the rights ( i.e. , right to access, right to information, e

GDPR 77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Analysis: FDA's Reworked Premarket Medical Device Guidance

Data Breach Today

The FDA's recently issued draft document updating its premarket medical device cybersecurity guidance originally issued in 2014 contains several important provisions, says regulatory attorney Yarmela Pavlovic, who explains the details.

article thumbnail

The GDPR: Requirements for encryption

IT Governance

Six months since the GDPR (General Data Protection Regulation) came into force, pseudonymisation and data encryption remain the only technology measures specifically mentioned in the famously technology-agnostic Regulation. Article 32 of the GDPR highlights “the pseudonymisation and encryption of personal data” as one of the “appropriate technical and organisational measures to ensure a level of security appropriate to the risk”.

article thumbnail

Empathy: The Next Killer App for Cybersecurity?

Dark Reading

The toughest security problems involve people not technology. Here's how to motivate your frontline employees all the way from the service desk to the corner office.

article thumbnail

Microsoft Patches Zero-Day Bug in Win7, Server 2008 and 2008 R2

Threatpost

Microsoft’s November Patch Tuesday fixes include mitigation against a zero-day vulnerability leaving Windows 7, Server 2008 and Server 2008 R2 open to attack.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Traffic Temporarily Rerouted via Russia, China

Dark Reading

The incident, which Google reports is now resolved, could be the result of either technical mistakes or malicious activity.

77
article thumbnail

Unpatched Android OS Flaw Allows Adversaries to Track User Location

Threatpost

The vulnerability is one of many with the same root cause: Cross-process information leakage.

Privacy 78
article thumbnail

Getting to Know Magecart: An Inside Look at 7 Groups

Dark Reading

A new report spills the details on Magecart, the criminal groups driving it, and ongoing attacks targeting low- and high-profile victims.

IT 66
article thumbnail

OpenText Discovery Release 16 EP5 raises the bar for legal technology

OpenText Information Management

OpenText™ Discovery serves a broad and diverse legal market with a range of solutions. Pillsbury Winthrop Shaw and Pittman leverage OpenText™ Axcelerate™ to power massive eDiscovery litigation projects; Liberty Mutual Insurance leverage OpenText™ EnCase™ to forensically collect data from tens of thousands of custodians; the UK SFO uses OpenText Axcelerate to investigate mountains of digital … The post OpenText Discovery Release 16 EP5 raises the bar for legal technology appeared first on O

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft Patch Tuesday Recap: 12 Critical Bugs Fixed

Dark Reading

Eight of the 12 critical vulnerabilities addressed this month affect the Chakra Scripting Engine in Microsoft Edge.

71
article thumbnail

Continuous monitoring and advanced threat detection for the global enterprise

OpenText Information Management

Information Security Continuous Monitoring (ISCM) projects can be expensive, data and network intensive implementations which often end in frustration for global organizations. Common approaches to continuous monitoring require bloated agents, put a burden on network traffic and may open a company to the risk of privacy violations through over-collection of endpoint telemetry.

Privacy 54
article thumbnail

EU Commission Responds to NTIA Request for Comment on Developing the Administration’s Approach to Consumer Privacy

Hunton Privacy

On November 9, 2018, the European Commission (“the Commission”) submitted comments to the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) in response to its request for public comments on developing the administration’s approach to consumer privacy. In its comments , the Commission welcomes and agrees with many of the high-level goals identified by NTIA, including harmonization of the legal landscape, incentivizing privacy research, employing a r

Privacy 53
article thumbnail

How to Improve Governance, Risk and Compliance

eSecurity Planet

VIDEO: Alissa Johnson, CISO at Xerox and former Deputy CIO at the White House, outlines compliance steps that could help all enterprises.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Labor makes last-ditch bid to extend My Health Record opt-out period

The Guardian Data Protection

Opposition likely to win Senate support to extend opt-out, which ends on Thursday, by 12 months Labor has announced it will move to amend the Coalition’s My Health Record bill in a bid to extend the opt-out period, days before records will be created automatically for 17m Australians. The push for a 12-month extension of the 15 November deadline is likely to win Senate support after Labor, the Greens, Centre Alliance and the crossbench called for a suspension in a non-binding motion on Monday.

article thumbnail

RIP, 'IT Security'

Dark Reading

Information security is vital, of course. But the concept of "IT security" has never made sense.

IT 68
article thumbnail

Podcast: IoT Firms Face a ‘Tidal Wave’ of Lawsuits, Attorney Explains

Threatpost

An attorney in the infamous 2015 Jeep hack predicts that more lawsuits related to IoT security are looming in the future.

IoT 54